By type
2022-10-06 16:26:14,516 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-10-06 16:26:16,061 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-10-06 16:26:16.857 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Oct 06, 2022 4:26:18 PM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Oct 06, 2022 4:26:18 PM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Oct 06, 2022 4:26:18 PM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Oct 06, 2022 4:26:19 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-10-06 16:26:19.770 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-10-06 16:26:20.251 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-10-06 16:26:20.460 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-10-06 16:26:21.282 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-10-06 16:26:21.284 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-10-06 16:26:21.285 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-10-06 16:26:21.289 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-10-06 16:26:21.335 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-10-06 16:26:21.345 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-10-06 16:26:21.533 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-10-06 16:26:22.373 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Oct 06, 2022 4:26:23 PM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-10-06 16:26:23.579 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 10.075 seconds (JVM running for 12.06) Oct 06, 2022 4:26:42 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-10-06 16:27:15.782 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-06 16:27:15.805 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-06 16:27:15.882 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-10-06 16:27:15.891 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-06 16:27:15.918 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-10-06 16:27:15.920 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-06 16:27:15.921 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-06 16:27:15.922 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-06 16:27:15.923 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 16:27:15.926 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-06 16:27:15.954 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-06 16:27:15.958 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-06 16:27:16.046 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-06 16:27:16.058 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 16:27:16.059 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 16:27:16.063 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 16:27:16.747 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-06 16:27:16.751 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-06 16:27:16.753 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-06 16:27:16.755 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 16:27:16.766 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-06 16:27:16.768 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-06 16:27:16.769 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 16:27:16.769 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 16:27:16.770 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 16:27:16.785 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 16:27:16.787 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 16:27:16.787 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 16:27:16.793 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 16:27:16.794 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 16:27:16.794 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 16:27:16.796 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-06 16:27:16.827 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 81794810018291933520263537837139611981723979208 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 06 16:23:04 UTC 2022 Final Date: Tue Oct 05 16:23:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:46:0b:08:fa:c5:95:d0:68:87:22:e4:41:e8:6a:70:de:19:8f:ac],[56:66:d1:a4] modulus: e67e8722220f9383a303682a387574dcbe58a1fdba2815fadbcf60cc2fd370c5013b82c45d4137cf37d8f34aabd94c385efcf7e3067b93aff87004f3aa5339f683f7c3f92e7f4840ea2133a101e70032d8c06c71674a57988ed64442ff8f792fc8612ec1b85748389c2c97f68fdb891052f509efae34b76acef4be5778fb19d92c880d680ed17594f7dfa894355ef36684445a36027faea6b80287656b5ca6a100402d240805fe0851262e89e5d1621d354f67c3d777a9ddfbfb82a73db282e0e41618f61d9c3569b6b0c4d896c5131eba6e91f6f37cd5bda9d45e8105af84032676b699be0d42d250c8e41673534ba5cb535285a166247f79ad5c7bb4679d121fab44a7ac739bf8d3f47d600fdb49db3ffd23fd505d65cd90a9c04d675b5101b4704840d6572e6495e18325cc4815a8a4f9e550d646dc15c2eafa805a8bf97ebe1dfeb0b1addab7c0f6ce7db3a4100f5bd860b4e7950aeb7681401355745db781344837e6419bbaaea63ba03723e1273c2cde5658120761b2baa0ced9e69b27 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a9265546f3833b19e27864cb5d713d9ccf963bfa 687954ec48239a7ec93c01ee3e5c8d081a56414f d3c0cf44f2374a9f4d44428a64645a2d741f6b7d 4a303edc1a4772770a4a91f8d685b7827b2e7bc3 6a618617f81a65851b62ccdd32bb4e303dd83352 22fdd48954a03c4559cc5fb653e12c9896012323 1026101ba9732f0e8c2721af0c27d6d059fe84c3 60549d8d65f4b4d123da22cc59d820b7f0511358 742d0dd9c0671c7c97827549caf8a64737eb0015 a47a12edb515ad129c5ab18f7e61af12e44058bb 26bc2ffecfd8b3970a06580d2c34eed24d33c29b fd9d4f212802a73ca9c3f771a78494604f8bb53c 141fac289a71df20f057bdd59549c820a21e9f5a a4b99d19d5413aad5a36ab6b169eca21224f2e93 b17e5f30aab0876c2053bfe374a21ceb5ba6a436 ac2096268145a57b972e77e62c47e5d76b203a27 cefeb28ed923f2e329dc83bd5fd3217b39f76770 1a6bc00b90b7a173f0b8851b39c7238be3a787f7 2214f192886734129e355279e26031b3822328c8 20b408ab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [87:65:6e:83:5f:ad:38:91:d2:d8:d4:ea:cc:0d:56:2c:a2:ec:eb:04],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-06 17:29:40.079 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-06 17:29:40.083 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-06 17:29:40.087 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-06 17:29:40.088 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-06 17:29:40.088 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-06 17:29:40.089 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-06 17:29:40.090 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-06 17:29:40.090 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-06 17:29:40.091 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-06 17:29:40.091 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-06 17:29:40.097 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-06 17:29:40.098 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 17:29:40.098 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 17:29:40.098 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 17:29:40.296 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-06 17:29:40.297 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-06 17:29:40.297 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-06 17:29:40.297 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 17:29:40.300 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-06 17:29:40.300 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-06 17:29:40.301 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:29:40.301 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:29:40.302 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:29:40.303 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:29:40.303 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:29:40.303 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:29:40.304 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:29:40.304 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:29:40.305 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:29:40.305 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-06 17:29:40.310 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 81794810018291933520263537837139611981723979208 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 06 16:23:04 UTC 2022 Final Date: Tue Oct 05 16:23:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:46:0b:08:fa:c5:95:d0:68:87:22:e4:41:e8:6a:70:de:19:8f:ac],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a9265546f3833b19e27864cb5d713d9ccf963bfa 687954ec48239a7ec93c01ee3e5c8d081a56414f d3c0cf44f2374a9f4d44428a64645a2d741f6b7d 4a303edc1a4772770a4a91f8d685b7827b2e7bc3 6a618617f81a65851b62ccdd32bb4e303dd83352 22fdd48954a03c4559cc5fb653e12c9896012323 1026101ba9732f0e8c2721af0c27d6d059fe84c3 60549d8d65f4b4d123da22cc59d820b7f0511358 742d0dd9c0671c7c97827549caf8a64737eb0015 a47a12edb515ad129c5ab18f7e61af12e44058bb 26bc2ffecfd8b3970a06580d2c34eed24d33c29b fd9d4f212802a73ca9c3f771a78494604f8bb53c 141fac289a71df20f057bdd59549c820a21e9f5a a4b99d19d5413aad5a36ab6b169eca21224f2e93 b17e5f30aab0876c2053bfe374a21ceb5ba6a436 ac2096268145a57b972e77e62c47e5d76b203a27 cefeb28ed923f2e329dc83bd5fd3217b39f76770 1a6bc00b90b7a173f0b8851b39c7238be3a787f7 2214f192886734129e355279e26031b3822328c8 20b408ab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b6:b8:34:6d:10:e4:c7:a6:ba:50:3a:c1:37:66:6d:eb:47:c9:6b:55],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-06 17:31:27.892 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-06 17:31:27.894 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-06 17:31:27.896 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-06 17:31:27.897 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-06 17:31:27.898 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-06 17:31:27.898 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-06 17:31:27.899 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-06 17:31:27.899 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-06 17:31:27.900 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-06 17:31:27.901 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-06 17:31:27.905 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-06 17:31:27.906 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 17:31:27.906 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 17:31:27.907 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 17:31:28.030 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-06 17:31:28.031 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-06 17:31:28.031 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-06 17:31:28.032 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 17:31:28.034 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-06 17:31:28.035 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-06 17:31:28.035 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:31:28.036 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:31:28.036 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:31:28.037 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:31:28.038 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:31:28.039 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:31:28.039 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:31:28.040 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:31:28.040 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:31:28.041 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-06 17:31:28.045 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 81794810018291933520263537837139611981723979208 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 06 16:23:04 UTC 2022 Final Date: Tue Oct 05 16:23:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:46:0b:08:fa:c5:95:d0:68:87:22:e4:41:e8:6a:70:de:19:8f:ac],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a9265546f3833b19e27864cb5d713d9ccf963bfa 687954ec48239a7ec93c01ee3e5c8d081a56414f d3c0cf44f2374a9f4d44428a64645a2d741f6b7d 4a303edc1a4772770a4a91f8d685b7827b2e7bc3 6a618617f81a65851b62ccdd32bb4e303dd83352 22fdd48954a03c4559cc5fb653e12c9896012323 1026101ba9732f0e8c2721af0c27d6d059fe84c3 60549d8d65f4b4d123da22cc59d820b7f0511358 742d0dd9c0671c7c97827549caf8a64737eb0015 a47a12edb515ad129c5ab18f7e61af12e44058bb 26bc2ffecfd8b3970a06580d2c34eed24d33c29b fd9d4f212802a73ca9c3f771a78494604f8bb53c 141fac289a71df20f057bdd59549c820a21e9f5a a4b99d19d5413aad5a36ab6b169eca21224f2e93 b17e5f30aab0876c2053bfe374a21ceb5ba6a436 ac2096268145a57b972e77e62c47e5d76b203a27 cefeb28ed923f2e329dc83bd5fd3217b39f76770 1a6bc00b90b7a173f0b8851b39c7238be3a787f7 2214f192886734129e355279e26031b3822328c8 20b408ab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8b:74:94:79:c0:10:8f:c6:4a:4f:b0:72:3b:9b:c0:ec:1e:79:aa:5d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-06 17:32:55.837 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-06 17:32:55.838 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-06 17:32:55.840 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-06 17:32:55.840 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-06 17:32:55.841 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-06 17:32:55.842 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-06 17:32:55.842 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-06 17:32:55.843 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-06 17:32:55.843 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-06 17:32:55.844 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-06 17:32:55.847 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-06 17:32:55.848 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 17:32:55.848 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 17:32:55.848 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 17:32:55.977 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-06 17:32:55.978 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-06 17:32:55.978 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-06 17:32:55.979 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 17:32:55.982 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-06 17:32:55.982 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-06 17:32:55.983 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:32:55.983 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:32:55.984 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:32:55.985 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:32:55.985 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:32:55.986 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:32:55.987 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:32:55.987 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:32:55.987 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:32:55.988 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-06 17:32:55.992 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 81794810018291933520263537837139611981723979208 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 06 16:23:04 UTC 2022 Final Date: Tue Oct 05 16:23:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:46:0b:08:fa:c5:95:d0:68:87:22:e4:41:e8:6a:70:de:19:8f:ac],[56:66:d1:a4] modulus: e67e8722220f9383a303682a387574dcbe58a1fdba2815fadbcf60cc2fd370c5013b82c45d4137cf37d8f34aabd94c385efcf7e3067b93aff87004f3aa5339f683f7c3f92e7f4840ea2133a101e70032d8c06c71674a57988ed64442ff8f792fc8612ec1b85748389c2c97f68fdb891052f509efae34b76acef4be5778fb19d92c880d680ed17594f7dfa894355ef36684445a36027faea6b80287656b5ca6a100402d240805fe0851262e89e5d1621d354f67c3d777a9ddfbfb82a73db282e0e41618f61d9c3569b6b0c4d896c5131eba6e91f6f37cd5bda9d45e8105af84032676b699be0d42d250c8e41673534ba5cb535285a166247f79ad5c7bb4679d121fab44a7ac739bf8d3f47d600fdb49db3ffd23fd505d65cd90a9c04d675b5101b4704840d6572e6495e18325cc4815a8a4f9e550d646dc15c2eafa805a8bf97ebe1dfeb0b1addab7c0f6ce7db3a4100f5bd860b4e7950aeb7681401355745db781344837e6419bbaaea63ba03723e1273c2cde5658120761b2baa0ced9e69b27 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a9265546f3833b19e27864cb5d713d9ccf963bfa 687954ec48239a7ec93c01ee3e5c8d081a56414f d3c0cf44f2374a9f4d44428a64645a2d741f6b7d 4a303edc1a4772770a4a91f8d685b7827b2e7bc3 6a618617f81a65851b62ccdd32bb4e303dd83352 22fdd48954a03c4559cc5fb653e12c9896012323 1026101ba9732f0e8c2721af0c27d6d059fe84c3 60549d8d65f4b4d123da22cc59d820b7f0511358 742d0dd9c0671c7c97827549caf8a64737eb0015 a47a12edb515ad129c5ab18f7e61af12e44058bb 26bc2ffecfd8b3970a06580d2c34eed24d33c29b fd9d4f212802a73ca9c3f771a78494604f8bb53c 141fac289a71df20f057bdd59549c820a21e9f5a a4b99d19d5413aad5a36ab6b169eca21224f2e93 b17e5f30aab0876c2053bfe374a21ceb5ba6a436 ac2096268145a57b972e77e62c47e5d76b203a27 cefeb28ed923f2e329dc83bd5fd3217b39f76770 1a6bc00b90b7a173f0b8851b39c7238be3a787f7 2214f192886734129e355279e26031b3822328c8 20b408ab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b7:41:e8:db:d0:06:99:22:c2:3e:c1:f2:51:8f:a0:46:d0:e0:71:58],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-06 17:34:48.244 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-06 17:34:48.247 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-06 17:34:48.249 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-06 17:34:48.250 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-06 17:34:48.250 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-06 17:34:48.252 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-06 17:34:48.252 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-06 17:34:48.254 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-06 17:34:48.254 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-06 17:34:48.255 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-06 17:34:48.260 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-06 17:34:48.260 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 17:34:48.261 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 17:34:48.261 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 17:34:48.397 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-06 17:34:48.398 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-06 17:34:48.398 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-06 17:34:48.398 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 17:34:48.399 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-06 17:34:48.400 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-06 17:34:48.400 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:34:48.401 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:34:48.401 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:34:48.402 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:34:48.402 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:34:48.403 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:34:48.403 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:34:48.404 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:34:48.404 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:34:48.405 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-06 17:34:48.408 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 81794810018291933520263537837139611981723979208 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 06 16:23:04 UTC 2022 Final Date: Tue Oct 05 16:23:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:46:0b:08:fa:c5:95:d0:68:87:22:e4:41:e8:6a:70:de:19:8f:ac],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a9265546f3833b19e27864cb5d713d9ccf963bfa 687954ec48239a7ec93c01ee3e5c8d081a56414f d3c0cf44f2374a9f4d44428a64645a2d741f6b7d 4a303edc1a4772770a4a91f8d685b7827b2e7bc3 6a618617f81a65851b62ccdd32bb4e303dd83352 22fdd48954a03c4559cc5fb653e12c9896012323 1026101ba9732f0e8c2721af0c27d6d059fe84c3 60549d8d65f4b4d123da22cc59d820b7f0511358 742d0dd9c0671c7c97827549caf8a64737eb0015 a47a12edb515ad129c5ab18f7e61af12e44058bb 26bc2ffecfd8b3970a06580d2c34eed24d33c29b fd9d4f212802a73ca9c3f771a78494604f8bb53c 141fac289a71df20f057bdd59549c820a21e9f5a a4b99d19d5413aad5a36ab6b169eca21224f2e93 b17e5f30aab0876c2053bfe374a21ceb5ba6a436 ac2096268145a57b972e77e62c47e5d76b203a27 cefeb28ed923f2e329dc83bd5fd3217b39f76770 1a6bc00b90b7a173f0b8851b39c7238be3a787f7 2214f192886734129e355279e26031b3822328c8 20b408ab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ee:dd:da:82:69:39:4a:02:73:0b:72:28:bd:57:cc:59:e4:b5:7d:a2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-06 17:39:49.108 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-06 17:39:49.110 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-06 17:39:49.111 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-06 17:39:49.112 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-06 17:39:49.116 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-06 17:39:49.116 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-06 17:39:49.117 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-06 17:39:49.118 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-06 17:39:49.120 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-06 17:39:49.121 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-06 17:39:49.127 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-06 17:39:49.128 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 17:39:49.128 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 17:39:49.129 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 17:39:49.282 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-06 17:39:49.283 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-06 17:39:49.284 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-06 17:39:49.284 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 17:39:49.292 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-06 17:39:49.293 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-06 17:39:49.293 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:39:49.293 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:39:49.294 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:39:49.294 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:39:49.294 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:39:49.295 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:39:49.295 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:39:49.296 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:39:49.296 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:39:49.297 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-06 17:39:49.299 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 81794810018291933520263537837139611981723979208 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 06 16:23:04 UTC 2022 Final Date: Tue Oct 05 16:23:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:46:0b:08:fa:c5:95:d0:68:87:22:e4:41:e8:6a:70:de:19:8f:ac],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a9265546f3833b19e27864cb5d713d9ccf963bfa 687954ec48239a7ec93c01ee3e5c8d081a56414f d3c0cf44f2374a9f4d44428a64645a2d741f6b7d 4a303edc1a4772770a4a91f8d685b7827b2e7bc3 6a618617f81a65851b62ccdd32bb4e303dd83352 22fdd48954a03c4559cc5fb653e12c9896012323 1026101ba9732f0e8c2721af0c27d6d059fe84c3 60549d8d65f4b4d123da22cc59d820b7f0511358 742d0dd9c0671c7c97827549caf8a64737eb0015 a47a12edb515ad129c5ab18f7e61af12e44058bb 26bc2ffecfd8b3970a06580d2c34eed24d33c29b fd9d4f212802a73ca9c3f771a78494604f8bb53c 141fac289a71df20f057bdd59549c820a21e9f5a a4b99d19d5413aad5a36ab6b169eca21224f2e93 b17e5f30aab0876c2053bfe374a21ceb5ba6a436 ac2096268145a57b972e77e62c47e5d76b203a27 cefeb28ed923f2e329dc83bd5fd3217b39f76770 1a6bc00b90b7a173f0b8851b39c7238be3a787f7 2214f192886734129e355279e26031b3822328c8 20b408ab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [31:f3:e6:a7:35:20:b0:cc:78:62:7a:c4:17:db:f1:9e:b8:b8:59:5f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-06 17:43:46.945 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-06 17:43:46.946 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-06 17:43:46.948 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-06 17:43:46.948 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-06 17:43:46.949 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-06 17:43:46.949 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-06 17:43:46.950 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-06 17:43:46.950 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-06 17:43:46.950 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-06 17:43:46.951 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-06 17:43:46.954 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-06 17:43:46.955 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 17:43:46.955 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 17:43:46.955 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 17:43:47.114 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-06 17:43:47.115 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-06 17:43:47.115 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-06 17:43:47.116 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 17:43:47.117 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-06 17:43:47.117 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-06 17:43:47.117 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:43:47.118 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:43:47.118 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:43:47.118 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:43:47.119 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:43:47.119 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:43:47.120 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:43:47.120 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:43:47.120 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:43:47.121 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-06 17:43:47.124 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 81794810018291933520263537837139611981723979208 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 06 16:23:04 UTC 2022 Final Date: Tue Oct 05 16:23:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:46:0b:08:fa:c5:95:d0:68:87:22:e4:41:e8:6a:70:de:19:8f:ac],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a9265546f3833b19e27864cb5d713d9ccf963bfa 687954ec48239a7ec93c01ee3e5c8d081a56414f d3c0cf44f2374a9f4d44428a64645a2d741f6b7d 4a303edc1a4772770a4a91f8d685b7827b2e7bc3 6a618617f81a65851b62ccdd32bb4e303dd83352 22fdd48954a03c4559cc5fb653e12c9896012323 1026101ba9732f0e8c2721af0c27d6d059fe84c3 60549d8d65f4b4d123da22cc59d820b7f0511358 742d0dd9c0671c7c97827549caf8a64737eb0015 a47a12edb515ad129c5ab18f7e61af12e44058bb 26bc2ffecfd8b3970a06580d2c34eed24d33c29b fd9d4f212802a73ca9c3f771a78494604f8bb53c 141fac289a71df20f057bdd59549c820a21e9f5a a4b99d19d5413aad5a36ab6b169eca21224f2e93 b17e5f30aab0876c2053bfe374a21ceb5ba6a436 ac2096268145a57b972e77e62c47e5d76b203a27 cefeb28ed923f2e329dc83bd5fd3217b39f76770 1a6bc00b90b7a173f0b8851b39c7238be3a787f7 2214f192886734129e355279e26031b3822328c8 20b408ab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5d:21:a5:ca:5b:7d:97:45:26:e2:fd:ec:d9:92:d7:3c:de:76:e3:7c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-06 17:48:58.063 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-06 17:48:58.065 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-06 17:48:58.067 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-06 17:48:58.068 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-06 17:48:58.068 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-06 17:48:58.069 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-06 17:48:58.069 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-06 17:48:58.070 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-06 17:48:58.070 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-06 17:48:58.070 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-06 17:48:58.074 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-06 17:48:58.075 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 17:48:58.075 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 17:48:58.075 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 17:48:58.299 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-06 17:48:58.300 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-06 17:48:58.300 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-06 17:48:58.301 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 17:48:58.302 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-06 17:48:58.302 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-06 17:48:58.303 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:48:58.303 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:48:58.303 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:48:58.304 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:48:58.304 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:48:58.305 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:48:58.305 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:48:58.305 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:48:58.306 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:48:58.307 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-06 17:48:58.309 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 81794810018291933520263537837139611981723979208 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 06 16:23:04 UTC 2022 Final Date: Tue Oct 05 16:23:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:46:0b:08:fa:c5:95:d0:68:87:22:e4:41:e8:6a:70:de:19:8f:ac],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a9265546f3833b19e27864cb5d713d9ccf963bfa 687954ec48239a7ec93c01ee3e5c8d081a56414f d3c0cf44f2374a9f4d44428a64645a2d741f6b7d 4a303edc1a4772770a4a91f8d685b7827b2e7bc3 6a618617f81a65851b62ccdd32bb4e303dd83352 22fdd48954a03c4559cc5fb653e12c9896012323 1026101ba9732f0e8c2721af0c27d6d059fe84c3 60549d8d65f4b4d123da22cc59d820b7f0511358 742d0dd9c0671c7c97827549caf8a64737eb0015 a47a12edb515ad129c5ab18f7e61af12e44058bb 26bc2ffecfd8b3970a06580d2c34eed24d33c29b fd9d4f212802a73ca9c3f771a78494604f8bb53c 141fac289a71df20f057bdd59549c820a21e9f5a a4b99d19d5413aad5a36ab6b169eca21224f2e93 b17e5f30aab0876c2053bfe374a21ceb5ba6a436 ac2096268145a57b972e77e62c47e5d76b203a27 cefeb28ed923f2e329dc83bd5fd3217b39f76770 1a6bc00b90b7a173f0b8851b39c7238be3a787f7 2214f192886734129e355279e26031b3822328c8 20b408ab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [aa:e1:44:54:ca:14:3f:3c:f7:7e:06:4b:08:3c:a1:0a:31:c9:e9:36],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-06 17:53:42.934 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-06 17:53:42.936 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-06 17:53:42.938 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-06 17:53:42.938 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-06 17:53:42.939 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-06 17:53:42.939 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-06 17:53:42.940 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-06 17:53:42.940 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-06 17:53:42.940 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-06 17:53:42.941 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-06 17:53:42.944 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-06 17:53:42.945 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 17:53:42.945 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 17:53:42.946 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 17:53:43.079 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-06 17:53:43.080 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-06 17:53:43.080 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-06 17:53:43.080 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 17:53:43.082 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-06 17:53:43.082 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-06 17:53:43.083 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:53:43.083 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:53:43.083 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:53:43.084 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:53:43.084 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:53:43.085 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:53:43.085 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:53:43.086 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:53:43.087 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:53:43.087 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-06 17:53:43.090 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 81794810018291933520263537837139611981723979208 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 06 16:23:04 UTC 2022 Final Date: Tue Oct 05 16:23:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:46:0b:08:fa:c5:95:d0:68:87:22:e4:41:e8:6a:70:de:19:8f:ac],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a9265546f3833b19e27864cb5d713d9ccf963bfa 687954ec48239a7ec93c01ee3e5c8d081a56414f d3c0cf44f2374a9f4d44428a64645a2d741f6b7d 4a303edc1a4772770a4a91f8d685b7827b2e7bc3 6a618617f81a65851b62ccdd32bb4e303dd83352 22fdd48954a03c4559cc5fb653e12c9896012323 1026101ba9732f0e8c2721af0c27d6d059fe84c3 60549d8d65f4b4d123da22cc59d820b7f0511358 742d0dd9c0671c7c97827549caf8a64737eb0015 a47a12edb515ad129c5ab18f7e61af12e44058bb 26bc2ffecfd8b3970a06580d2c34eed24d33c29b fd9d4f212802a73ca9c3f771a78494604f8bb53c 141fac289a71df20f057bdd59549c820a21e9f5a a4b99d19d5413aad5a36ab6b169eca21224f2e93 b17e5f30aab0876c2053bfe374a21ceb5ba6a436 ac2096268145a57b972e77e62c47e5d76b203a27 cefeb28ed923f2e329dc83bd5fd3217b39f76770 1a6bc00b90b7a173f0b8851b39c7238be3a787f7 2214f192886734129e355279e26031b3822328c8 20b408ab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [21:b4:bc:36:e9:6b:90:c4:9f:40:6b:41:e2:3b:0d:71:aa:c5:4c:cd],[56:66:d1:a4] modulus: e83f6e36a06480574a892c654e364c0fa9cf26bf9dd587c9d09e29e7ef009c5ae41e2248de3fc29286acf61b3ba9f1c2bb5bb4cf94381eef60df8e8b81a45ec34b83c87f3b97d62aa60aa44605e4b1b5225615be8d95652351811d802f15a4739f005fada3b1fc186088969a6d1336507916dc5c141a6015f366e8e4927f0f6f079910580599ada5832dd5859d5b26a5ebe4497a2a613219c4ab24229dbdf140e50a82928291e3a6649111a1f1e9e4222a1caaf20d2b0b48e1ecfb8a732f669616eab415384224466a677938124b61e3127696a6c0a36599f0a861a180ac123e8c9352df028bfe86540128758714083cafda550aba0f8ce3659a7f92bfdf874b public exponent: 10001 ] 2022-10-06 17:54:04.141 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-06 17:54:04.142 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-06 17:54:04.144 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-06 17:54:04.145 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-06 17:54:04.145 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-06 17:54:04.146 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-06 17:54:04.146 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-06 17:54:04.147 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-06 17:54:04.148 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-06 17:54:04.148 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-06 17:54:04.151 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-06 17:54:04.152 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 17:54:04.152 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 17:54:04.153 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 17:54:04.295 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-06 17:54:04.296 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-06 17:54:04.296 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-06 17:54:04.297 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 17:54:04.298 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-06 17:54:04.298 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-06 17:54:04.299 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:54:04.299 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:54:04.300 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:54:04.300 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:54:04.300 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:54:04.301 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:54:04.301 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 17:54:04.302 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 17:54:04.302 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 17:54:04.303 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-06 17:54:04.305 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 81794810018291933520263537837139611981723979208 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 06 16:23:04 UTC 2022 Final Date: Tue Oct 05 16:23:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:46:0b:08:fa:c5:95:d0:68:87:22:e4:41:e8:6a:70:de:19:8f:ac],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a9265546f3833b19e27864cb5d713d9ccf963bfa 687954ec48239a7ec93c01ee3e5c8d081a56414f d3c0cf44f2374a9f4d44428a64645a2d741f6b7d 4a303edc1a4772770a4a91f8d685b7827b2e7bc3 6a618617f81a65851b62ccdd32bb4e303dd83352 22fdd48954a03c4559cc5fb653e12c9896012323 1026101ba9732f0e8c2721af0c27d6d059fe84c3 60549d8d65f4b4d123da22cc59d820b7f0511358 742d0dd9c0671c7c97827549caf8a64737eb0015 a47a12edb515ad129c5ab18f7e61af12e44058bb 26bc2ffecfd8b3970a06580d2c34eed24d33c29b fd9d4f212802a73ca9c3f771a78494604f8bb53c 141fac289a71df20f057bdd59549c820a21e9f5a a4b99d19d5413aad5a36ab6b169eca21224f2e93 b17e5f30aab0876c2053bfe374a21ceb5ba6a436 ac2096268145a57b972e77e62c47e5d76b203a27 cefeb28ed923f2e329dc83bd5fd3217b39f76770 1a6bc00b90b7a173f0b8851b39c7238be3a787f7 2214f192886734129e355279e26031b3822328c8 20b408ab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2f:a0:61:f1:62:75:2b:0e:fe:4e:1a:c3:a9:04:6e:4e:d5:a4:63:41],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-06 18:12:50.651 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-06 18:12:50.653 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-06 18:12:50.656 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-06 18:12:50.656 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-06 18:12:50.657 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-06 18:12:50.658 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-06 18:12:50.658 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-06 18:12:50.659 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-06 18:12:50.659 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-06 18:12:50.660 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-06 18:12:50.664 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-06 18:12:50.665 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 18:12:50.665 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 18:12:50.665 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 18:12:50.802 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-06 18:12:50.803 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-06 18:12:50.803 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-06 18:12:50.804 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 18:12:50.805 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-06 18:12:50.805 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-06 18:12:50.806 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 18:12:50.806 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 18:12:50.807 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 18:12:50.807 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 18:12:50.808 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 18:12:50.808 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 18:12:50.809 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 18:12:50.809 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 18:12:50.809 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 18:12:50.810 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-06 18:12:50.813 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 81794810018291933520263537837139611981723979208 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 06 16:23:04 UTC 2022 Final Date: Tue Oct 05 16:23:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:46:0b:08:fa:c5:95:d0:68:87:22:e4:41:e8:6a:70:de:19:8f:ac],[56:66:d1:a4] modulus: e67e8722220f9383a303682a387574dcbe58a1fdba2815fadbcf60cc2fd370c5013b82c45d4137cf37d8f34aabd94c385efcf7e3067b93aff87004f3aa5339f683f7c3f92e7f4840ea2133a101e70032d8c06c71674a57988ed64442ff8f792fc8612ec1b85748389c2c97f68fdb891052f509efae34b76acef4be5778fb19d92c880d680ed17594f7dfa894355ef36684445a36027faea6b80287656b5ca6a100402d240805fe0851262e89e5d1621d354f67c3d777a9ddfbfb82a73db282e0e41618f61d9c3569b6b0c4d896c5131eba6e91f6f37cd5bda9d45e8105af84032676b699be0d42d250c8e41673534ba5cb535285a166247f79ad5c7bb4679d121fab44a7ac739bf8d3f47d600fdb49db3ffd23fd505d65cd90a9c04d675b5101b4704840d6572e6495e18325cc4815a8a4f9e550d646dc15c2eafa805a8bf97ebe1dfeb0b1addab7c0f6ce7db3a4100f5bd860b4e7950aeb7681401355745db781344837e6419bbaaea63ba03723e1273c2cde5658120761b2baa0ced9e69b27 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a9265546f3833b19e27864cb5d713d9ccf963bfa 687954ec48239a7ec93c01ee3e5c8d081a56414f d3c0cf44f2374a9f4d44428a64645a2d741f6b7d 4a303edc1a4772770a4a91f8d685b7827b2e7bc3 6a618617f81a65851b62ccdd32bb4e303dd83352 22fdd48954a03c4559cc5fb653e12c9896012323 1026101ba9732f0e8c2721af0c27d6d059fe84c3 60549d8d65f4b4d123da22cc59d820b7f0511358 742d0dd9c0671c7c97827549caf8a64737eb0015 a47a12edb515ad129c5ab18f7e61af12e44058bb 26bc2ffecfd8b3970a06580d2c34eed24d33c29b fd9d4f212802a73ca9c3f771a78494604f8bb53c 141fac289a71df20f057bdd59549c820a21e9f5a a4b99d19d5413aad5a36ab6b169eca21224f2e93 b17e5f30aab0876c2053bfe374a21ceb5ba6a436 ac2096268145a57b972e77e62c47e5d76b203a27 cefeb28ed923f2e329dc83bd5fd3217b39f76770 1a6bc00b90b7a173f0b8851b39c7238be3a787f7 2214f192886734129e355279e26031b3822328c8 20b408ab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ee:26:9f:c2:60:b5:ca:a2:d1:22:b0:40:2b:56:ed:f0:99:c3:74:93],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-06 18:12:57.376 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-10-06 18:12:57.377 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-10-06 18:12:57.378 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-06 18:12:57.378 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-06 18:12:57.378 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-06 18:12:57.379 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-10-06 18:12:57.379 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-10-06 18:12:57.379 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-10-06 18:12:57.380 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-10-06 18:12:57.380 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-10-06 18:12:57.384 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-10-06 18:12:57.384 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 18:12:57.385 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-10-06 18:12:57.385 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 18:12:57.483 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-10-06 18:12:57.483 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-10-06 18:12:57.484 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-10-06 18:12:57.484 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-10-06 18:12:57.485 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-10-06 18:12:57.485 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-10-06 18:12:57.485 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 18:12:57.486 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 18:12:57.486 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 18:12:57.486 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 18:12:57.486 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 18:12:57.487 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 18:12:57.487 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-06 18:12:57.488 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-10-06 18:12:57.488 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-10-06 18:12:57.489 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-06 18:12:57.491 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 81794810018291933520263537837139611981723979208 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 06 16:23:04 UTC 2022 Final Date: Tue Oct 05 16:23:03 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:46:0b:08:fa:c5:95:d0:68:87:22:e4:41:e8:6a:70:de:19:8f:ac],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a9265546f3833b19e27864cb5d713d9ccf963bfa 687954ec48239a7ec93c01ee3e5c8d081a56414f d3c0cf44f2374a9f4d44428a64645a2d741f6b7d 4a303edc1a4772770a4a91f8d685b7827b2e7bc3 6a618617f81a65851b62ccdd32bb4e303dd83352 22fdd48954a03c4559cc5fb653e12c9896012323 1026101ba9732f0e8c2721af0c27d6d059fe84c3 60549d8d65f4b4d123da22cc59d820b7f0511358 742d0dd9c0671c7c97827549caf8a64737eb0015 a47a12edb515ad129c5ab18f7e61af12e44058bb 26bc2ffecfd8b3970a06580d2c34eed24d33c29b fd9d4f212802a73ca9c3f771a78494604f8bb53c 141fac289a71df20f057bdd59549c820a21e9f5a a4b99d19d5413aad5a36ab6b169eca21224f2e93 b17e5f30aab0876c2053bfe374a21ceb5ba6a436 ac2096268145a57b972e77e62c47e5d76b203a27 cefeb28ed923f2e329dc83bd5fd3217b39f76770 1a6bc00b90b7a173f0b8851b39c7238be3a787f7 2214f192886734129e355279e26031b3822328c8 20b408ab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6e:54:9f:5c:2b:51:f0:1c:b4:04:3c:80:5b:8c:15:34:fa:cc:51:27],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]